Lines Matching refs:messages

378      the affected side to wrongly reject valid messages. Fixes #4118.
1032 SSLv2 ClientHello messages.
1662 * Zeroize memory used for buffering or reassembling handshake messages
1724 * Add support for fragmentation of outgoing DTLS handshake messages. This
1733 * Add support for buffering out-of-order handshake messages in DTLS.
1777 * Add support for buffering of out-of-order handshake messages.
1787 partially recover the plaintext of messages under some conditions by
1789 this recovery by sending many messages in the same connection. With TLS
1801 plaintext of messages under some conditions by using a cache attack
1811 to partially recover the plaintext of messages under some conditions (see
1856 * Fix decryption for zero length messages (which contain all padding) when a
1871 zero-length messages when using TLS 1.2. Contributed by Espressif Systems.
2001 returned when unexpected messages were being discarded, ignoring that
2002 further messages could potentially already be pending to be processed
2288 * Fix handling of handshake messages in mbedtls_ssl_read() in case
2488 suppressing the CA list in Certificate Request messages. The default
2512 * Add checks to prevent signature forgeries for very large messages while
2523 CertificateVerify messages, to prevent SLOTH attacks against TLS 1.2.
2904 * Prepend a "thread identifier" to debug messages (issue pointed out by
3219 * Added new error codes and debug messages about selection of
3311 It was possible to crash the server (and client) using crafted messages
3380 * debug_set_threshold() added to ignore messages over threshold level
3440 * The length of various ClientKeyExchange messages was not properly checked.
3800 It was possible to crash the server (and client) using crafted messages
3948 * Debug messages about padding errors during SSL message decryption are
3950 * Sending of security-relevant alert messages that do not break
4099 * Debug messages about padding errors during SSL message decryption are
4149 * Fixed potential memory corruption on miscrafted client messages (found by